An issue was discovered in the SFTP Server component in Core FTP 2.0 Build 674. A directory traversal vulnerability exists using the SIZE command along with a \..\..\ substring, allowing an attacker to enumerate file existence based on the returned information.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/154204/CoreFTP-Server-SIZE-Directory-Traversal.html | |
http://seclists.org/fulldisclosure/2019/Aug/21 | |
http://www.coreftp.com/forums/viewtopic.php?f=15&t=4022509 | Product Vendor Advisory |
http://www.securityfocus.com/bid/107446 | Third Party Advisory VDB Entry |
https://seclists.org/fulldisclosure/2019/Mar/23 | Exploit Mailing List Third Party Advisory |
https://www.exploit-db.com/exploits/46535 | Exploit Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2019-03-22 19:29
Updated : 2024-02-04 20:20
NVD link : CVE-2019-9648
Mitre link : CVE-2019-9648
CVE.ORG link : CVE-2019-9648
JSON object : View
Products Affected
coreftp
- core_ftp
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')